OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
☆14Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for juice-shop
Users that are interested in juice-shop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Feb 6, 2025Updated last year
- ☆30Jul 5, 2023Updated 2 years ago
- A tool to find domains that are in the same Microsoft tenant☆24Mar 18, 2025Updated last year
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 3 months ago
- Active monitoring bug bounty programs tool☆49Jan 21, 2026Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆59Apr 8, 2021Updated 5 years ago
- ☆51Apr 2, 2021Updated 5 years ago
- ☆46Oct 7, 2021Updated 4 years ago
- A quick bug bounty guide for beginners☆93May 3, 2025Updated last year
- Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in a…☆72Mar 5, 2022Updated 4 years ago
- Remote CLI tools at your fingertips☆104Jul 31, 2024Updated last year
- clone from https://sourceforge.net/projects/crunch-wordlist/☆122Sep 20, 2016Updated 9 years ago
- Automation of tokens/api keys testing.☆153Mar 28, 2023Updated 3 years ago
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆231Jul 24, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆226Sep 25, 2025Updated 7 months ago
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆210Aug 13, 2024Updated last year
- recon for bug hunters☆881Mar 5, 2026Updated 2 months ago
- Gourlex is a simple tool that can be used to extract URLs and paths from web pages.☆254Mar 28, 2024Updated 2 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,333Jan 10, 2025Updated last year
- An hourly updated list of subdomains gathered from certificate transparency logs☆346Oct 13, 2021Updated 4 years ago
- Bug Bounty Tools used on Twitch - Recon☆321Sep 6, 2024Updated last year
- Bambdas collection for Burp Suite Professional and Community.☆521Mar 12, 2026Updated last month
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆457Apr 27, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SQL Injection Vulnerability Scanner made with Python☆389Apr 15, 2026Updated 3 weeks ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,366Jun 27, 2024Updated last year
- ☆545Jun 26, 2024Updated last year
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆502Jun 28, 2025Updated 10 months ago
- A modern tool written in Python that automates your xss findings.☆474Nov 26, 2023Updated 2 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆562Mar 8, 2025Updated last year
- i will upload more templates here to share with the comunity.☆569Apr 17, 2024Updated 2 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆921Apr 6, 2021Updated 5 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆758Dec 19, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔☆855Jun 27, 2022Updated 3 years ago
- My own OSCP guide☆847Sep 5, 2022Updated 3 years ago
- Open source education content for the researcher community☆2,777Apr 13, 2022Updated 4 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆770Jan 3, 2021Updated 5 years ago
- Powerful Tool to Grab Front Camera Snaps Using A Link☆1,259Mar 19, 2023Updated 3 years ago
- Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists☆773Feb 12, 2023Updated 3 years ago
- OWASP API Security Project☆2,277Jan 1, 2026Updated 4 months ago